Free Assessment

Security Self-Assessment Checklist

Check off the security measures your business has in place. Get a risk score and detailed report with recommendations for gaps.

0 of 30 measures checked0%

Physical Security

0/5
Server room / network closet is locked and access-controlled
Visitor access to sensitive areas is logged and supervised
Security cameras cover entry points and server areas
Devices are physically secured (cable locks, locked cabinets)
Clean desk policy is in place for sensitive documents

Data Protection

0/6
All sensitive data is encrypted at rest and in transit
Regular automated backups are running and verified
Data classification policy exists (public, internal, confidential)
Sensitive data disposal procedures are documented
Personal and business data are separated on devices
Database access is restricted and logged

Employee Training

0/5
Security awareness training is conducted at least annually
New employee security onboarding is documented
Phishing simulation tests are conducted regularly
Employees know how to report suspicious emails or activity
Remote work security guidelines are provided

Incident Response

0/5
Written incident response plan exists
Incident response roles and contacts are assigned
Incident response plan has been tested or rehearsed
Communication plan for notifying affected parties exists
Post-incident review process is defined

Vendor Management

0/4
Third-party vendors are vetted for security practices
Vendor access to systems is limited and monitored
Contracts include data protection and breach notification clauses
Vendor access is revoked promptly when no longer needed

Compliance

0/5
Applicable compliance requirements are identified (HIPAA, PCI, etc.)
Privacy policy is published and up to date
Data retention and deletion policies are documented
Regular compliance audits or reviews are conducted
Employee access to regulated data is tracked and auditable

About This Assessment

This self-assessment checklist helps you evaluate your business's security measures across six categories: Physical Security, Data Protection, Employee Training, Incident Response, Vendor Management, and Compliance. Check off items you have in place, then generate a report showing your gaps and recommended next steps.

Unlike our Security Survey (which asks scored questions), this checklist provides a simple yes/no audit of specific security measures. It's ideal for creating an action plan of specific items to implement.

Need Help Closing Security Gaps?

Our team can help you implement the security measures identified in your assessment. Contact us for a free consultation.